Web·Armor®
Additional Layer of Encryption on the Internet
Double layer of information
through HTTPS
Web·Armor® is an innovative JavaScript library developed by Cyte® that facilitates the implementation of cryptographic operations on both the client and server sides.
This versatile tool can be employed in mobile applications, web browsers (frontend), and servers (backend), ensuring the security of information transmitted across various devices and platforms.
The library offers user-friendly methods for web and mobile application developers, enabling the integration of encryption algorithms, authentication, hashing, and random number generation, among others.
Its primary objective is to provide defence in depth, applying multiple layers of cryptographic protection beyond standard measures like TLS.
Web•Armor® implements a cross-platform server that can operate either in the cloud or locally and is compatible with any operating system. On the frontend of web or mobile applications, the library's client is deployed. Together, the server and client securely perform key calculations using ECC and ZKP, enabling the encryption of sensitive data in transit.
This creates an additional layer of security with advanced cryptographic algorithms, preventing attacks in the event of vulnerabilities in TLS/SSL or unauthorised access to stored data.
This solution is specifically designed for large organisations, such as banks, that need to secure their web and mobile applications but lack the time or expertise to correctly implement the appropriate cryptographic primitives. Web•Armor® simplifies this process by offering a wide range of algorithms and easy-to-use implementation methods.
Among the cryptographic primitives offered by Web•Armor® are:
Encryption and Authentication Algorithms
Web•Armor® offers both symmetric and asymmetric algorithms to ensure the confidentiality and authentication of information. Symmetric algorithms, such as AES, are ideal for encrypting files and data whether at rest or in transit. Elliptic curve asymmetric algorithms, such as ECDSA, ECC-ElGamal, and ECIES, enable efficient authentication and verification of information integrity, accommodating a wide range of use cases.
Hash and Key Generation
The library includes methods for generating hashes using SHA256 or SHA512, which are essential for cryptographic operations such as encryption, signing, and authentication. Additionally, it offers HOTP and TOTP protocols for generating one-time passwords (OTP), commonly used as a second factor of authentication, thereby enhancing security when accessing critical applications.
Pseudo-randomness and Cryptographic Security
Web•Armor® ensures the correct implementation of cryptographic algorithms by providing methods to obtain secure pseudo-random values (PRNG). These values are fundamental to the robustness of cryptographic algorithms and the generation of secure keys, guaranteeing the integrity of cryptographic processes.
Message Integrity and Key Derivation
Message integrity is ensured through the use of hash-based message authentication codes (HMAC). The library also enables key derivation based on HMAC (HKDF), ensuring unique and secure cryptographic keys, preventing key reuse, and improving the management of multiple keys.
Zero Knowledge Algorithms
Web•Armor® includes implementations of Zero Knowledge Proof (ZKP) algorithms, which allow information verification without revealing the original data. This feature is crucial for protecting privacy and ensuring the authenticity of transactions without compromising the security of the information.
Provide an additional layer of encryption for your company
Double layer encryption
Professional Support
Schedule a Demonstration